12 research outputs found

    Multi-channel Utilization Algorithms for IEEE 802.15.4 based Wireless Network: A Survey

    Get PDF
    In the pass years, IEEE 802.15.4 based Wireless Sensor Networks (WSNs) have received great attention and have been employed in many areas such as inventory checking, local monitoring and alarming etc. One of the key issues affecting WSN's system performance is interference caused by devices operating with the same or different standards on the overlapping frequency within the 2.4 GHz ISM band. This paper addresses the coexistence problem, which is the key motivation for the necessity of flexible channel usage. A review of existing approaches being proposed to date supporting multi-channel utilization in IEEE 802.15.4 based WSNs is categorized and discussed. The paper also presents major functionalities needed in implementing multi-channel utilization

    An intelligent-agent approach for managing congestion in W-CDMA networks

    Get PDF
    PhDResource Management is a crucial aspect in the next generation cellular networks since the use of W-CDMA technology gives an inherent flexibility in managing the system capacity. The concept of a “Service Level Agreement” (SLA) also plays a very important role as it is the means to guarantee the quality of service provided to the customers in response to the level of service to which they have subscribed. Hence there is a need to introduce effective SLA-based policies as part of the radio resource management. This work proposes the application of intelligent agents in SLA-based control in resource management, especially when congestion occurs. The work demonstrates the ability of intelligent agents in improving and maintaining the quality of service to meet the required SLA as the congestion occurs. A particularly novel aspect of this work is the use of learning (here Case Based Reasoning) to predict the control strategies to be imposed. As the system environment changes, the most suitable policy will be implemented. When congestion occurs, the system either proposes the solution by recalling from experience (if the event is similar to what has been previously solved) or recalculates the solution from its knowledge (if the event is new). With this approach, the system performance will be monitored at all times and a suitable policy can be immediately applied as the system environment changes, resulting in maintaining the system quality of service

    Centralized Control for Dynamic Channel Allocation in IEEE 802.15.4 Based Wireless Sensor Networks

    Get PDF
    Coexistence problem is one of the most important issues in the IEEE 802.15.4 based Wireless Sensor Networks (WSNs), since the system operates on the highly populated 2.4 GHz ISM band. As a result, system performance of WSNs can be greatly impaired by the interference from over powering signal from other systems such as WLAN and Bluetooth. This paper proposes an approach based on centralized control for dynamic channel allocation. The proposed method offers multi-channel utilization with intelligent controlling mechanism in order to provide system performance enhancement in order to cope with variation of interfered environment. Based on centralized control, decision making process is performed by the network coordinator allowing such system flexibility. Simulation model has been developed and it is embedded with this proposed mechanism in order to test the system performance. To observe the system performance under the proposed method, variety of simulation scenarios are performed with the variation of two major factors affecting system performance including the size of the network topology and the scale of interference. Proposed method is evaluated and the simulation results are compared against tradition system as well as system with multi-channel utilization method with channel scheduling. The flexibility of the method proposed here allows the system to have better system performance under different test scenarios both in terms of average packet end-to-end delay and system throughput

    Cognitive Wireless Sensor Networks: Intelligent Channel Assignment

    Get PDF
    One of the major problems in Wireless Sensor Networks (WSNs) is the traffic congestion caused by increasing number of devices sharing the limited spectrum of the ISM (Industrial, Scientific, and Medical radio) band. As a result, a new concept of Cognitive Wireless Sensor Networks (CWSNs) has been proposed in order to achieve reliable and efficient communication via spectrum awareness and smart adaption. Based on such concept, this paper proposes the intelligent channel assignment technique for channel management in CWSNs. The proposed method is based on the learning and prediction technique so called Policy Gradient together with our proposed virtual channel environment classification. Simulation model is used for the system performance evaluation. The simulation results show that our proposed intelligent channel assignment provides substantially higher performance in terms of system throughput and average packet end-to-end delay than the traditional IEEE 802.15.4 based system. It also outperforms the systems integrated with Episodic Reinforcement and GPOMDP learning technique

    Blockchain Technology, Technical Challenges and Countermeasures for Illegal Data Insertion

    Get PDF
    Blockchain is a decentralized transaction and data management technology. It was developed for the world’s first cryptocurrency known as Bitcoin in 2008. The reason behind its popularity was its properties which provide pseudonymity, security, and data integrity without third-party intervention.  Initially, most of the researches were focused on the Bitcoin system and its limitation, but later other applications of Blockchain e.g. smart contracts and licensing [1] also got famous. Blockchain technology has the potential to change the way how transactions are conducted in daily life. It is not limited to cryptocurrencies but could be possibly applied in various environments where any forms of transactions are done. This article presents a comprehensive overview of Blockchain technology, its development, applications, security issues, and their countermeasures. In particular, the security towards illegal data insertion and the countermeasures is focused. Our analysis of countermeasures of illegal data insertion can be combined for increased efficiency. After the introduction of the Blockchain and consensus algorithm, some famous Blockchain applications and expected future of Blockchain are deliberated. Then, the technical challenges of Blockchain are discussed, in which the main focus here is on the security and the data insertion in Blockchain. The review of the possible countermeasures to overcome the security issues related to data insertion are elaborated

    Selected RSSI-based DV-Hop Localization for Wireless Sensor Networks

    Get PDF
    With the increasing demand on wireless sensor networks (WSNs) applications, acquiring the information of sensor node locations becomes one of the most important issues. Up to now, available localization approaches can be categorized into range-free and range-based methods. Range-free localizations are being pursued as a more cost-effective method. However, range-based schemes have better localization accuracy. This paper proposes the selected RSSI-based DV-Hop localization, which improves localization accuracy from the existing schemes by applying a combined technique that inherits the benefits from both methods. Our proposed technique firstly employs the DV-Hop approach of range-free algorithms, then uses the received signal strength indicator (RSSI) estimation technique of range-based algorithms to estimate the distances of selected hops. This paper also includes basic studies, which have been performed via computer simulations as well as testbed experiments, for distance calculation from RSSI measurement and location estimation in order to prove the credibility of our simulator. The proposed technique is implemented and tested via our developed WSN simulation model. Results in terms of distance error in comparison with traditional DV-Hop, RDV-Hop, and weighted RSSI algorithms show significant performance improvement by using our proposed method for both low-density and high-density wireless sensor network test scenarios

    Comparative Study of Scheduling Algorithms in LTE HetNets with Almost Blank Subframe

    Get PDF
    The trend and human lifestyle have been changing, which lead to the tremendously increasing demand for data usage over wireless communication systems even on the go. Traffic offload has been used for LTE Heterogeneous Networks (HetNets) to optimize overall system capacity via load balancing mechanisms among network tiers. In this work, the two main techniques used for interference coordination in the multi-tier systems i.e. Almost Blank Subframe (ABS) and Cell Range Expansion (CRE) have been focused on. Resource scheduling is one of the major issues in LTE HetNets aimed at efficient radio resource allocation. Based on the implementation of ABS and CRE mechanisms, this work investigates the system performance while different scheduling schemes are implemented. Five scheduling schemes including Round Robin (RR), Best-Channel Quality Identification (Best-CQI), Maximum Throughput (Max-TP), Proportional Fairness (PF), and Resource Fairness (RF) are considered here. The simulation studies include a comparison of the LTE HetNet system performance under different ABS and CRE configured parameters as well as employing different scheduling mechanisms. System performance is observed in terms of the average throughput, the peak throughput, the edge throughput, and the fairness index. The results provide recommendations on the system configurations as well as the choice of a scheduler that can be considered or suitable for different scenarios and network planning objectives. Coined from these results, the Best-CQI and the Max-TP mechanism offer the highest peak throughput and the high average throughput. The RR, PF, and RF provide the high cell edge throughput and fairness index, however, the peak throughput has been compromised

    Multi-channel Utilization Algorithms for IEEE 802.15.4 based Wireless Network: A Survey

    No full text

    Selected RSSI-based DV-Hop Localization for Wireless Sensor Networks

    No full text

    Cognitive Wireless Sensor Networks: Intelligent Channel Assignment

    No full text
    corecore